1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexeev081 [22]
3 years ago
9

Why is it essential for every person living in the 21st century to have a computer​

Computers and Technology
1 answer:
Zolol [24]3 years ago
4 0

Answer: because computers are our main source of communicating and where we find a wide range of information to help us

Explanation:

You might be interested in
A for loop
MAVERICK [17]

Answer:

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa

Explanation:

i feel that i remmeber it from a test

8 0
3 years ago
10.13 lab 10c: output range with increment of 5 write a program whose input is two integers. output the first integer and subseq
Lynna [10]

he program gives an output in increment of 5, if the first inputted integer is less than the second. The program written in python 3 goes thus

3 0
2 years ago
Eric walks 7 km East in 2 hours and then 2.5 km West in 1 hour.
Sidana [21]
Ok what is the question this is just a statement on what it is eric did.
7 0
3 years ago
What sequence would a user need to follow to change Chart A into Chart B?
alexandr402 [8]

Either options C or D

You can change the chart type of the whole chart or for single data series in most 2-D charts to give the chart a different look. In 3D or bubble charts, you can only change the chart type of the whole chart. By following the steps in the answers above, you will be in a position to select available chart type like column chart or line chart.

3 0
3 years ago
John have subscribed to a cloud-based service to synchronize data between your mobile device and your PC. Before allowing the da
xeze [42]

Answer: Mutual authentication

Explanation: Mutual authentication could be referred to a vetting process where the two entities in communication authenticate each other, it could also be referred to as a two-way authentication.

In the scenario above, the cloud service or server authenticates itself with the client and the client authentication itself with the cloud service server by verifying or vetting the certificates of both communicating entities before a secure encrypted connection would be established or created.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Regional culture has been affected by technology in these ways. Select all that apply. decreased educational opportunities impro
    9·2 answers
  • Which of the following is the correct syntax for a hyperlink:
    7·1 answer
  • If a drastic change in environmental conditions results in a prolonged drought, how would the total population of ferns be affec
    14·2 answers
  • What is a thesaurus is best used for​
    11·2 answers
  • A block level element begins on a new line and some space is usually added before and after it - True or False?
    13·1 answer
  • A technician is configuring a new SOHO multifunction wireless router at a customer’s location to provide network access to sever
    12·1 answer
  • Which of the following would not be considered a PC?
    13·2 answers
  • The objects that you place on master pages are called _____.
    6·1 answer
  • Who would win in a fight iron man or bat man​
    5·2 answers
  • Which measure is best to use to avoid outliers from corrupting the average?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!